If you made any changes in Pure these will be visible here soon.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2009 2018

  • 5 Conference Paper
  • 1 Article

Detecting general algebraic manipulation attacks

Ramchen, K., 2018, Proceedings of the 6th International Cryptology and Information Security Conference 2018 . Min, G. B., Kamarulhaili, H., Huay, H. S., Mohamad, M. S., Said, M. R. M. & Ariffin, M. R. K. (eds.). Selangor Darul Ehsan Malaysia: Institute for Mathematical Research (INSPEM), p. 51-63 13 p. 157

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
14 Citations (Scopus)

Separations in circular security for arbitrary length key cycles

Koppula, V., Ramchen, K. & Waters, B., 2015, Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015 Warsaw, Poland, March 23-25, 2015 Proceedings, Part II. Dodis, Y. & Nielsen, J. B. (eds.). Berlin Germany: Springer, p. 378-400 23 p. (Lecture Notes in Computer Science; vol. 9015).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Fully secure and fast signing from obfuscation

Ramchen, K. & Waters, B., 2014, Proceedings of the 21st ACM Conference on Computer and Communications Security. Yung, M. & Li, N. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 659-673 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Relaxed two-to-one recoding schemes

Pandey, O., Ramchen, K. & Waters, B., 2014, Security and Cryptography for Networks: 9th International Conference, SCN 2014 Amalfi, Italy, September 3-5, 2014 Proceedings. Abdalla, M. & de Prisco, R. (eds.). Cham Switzerland: Springer, p. 57-76 20 p. (Lecture Notes in Computer Science; vol. 8642).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Efficiently shuffling in public

Parampalli, U., Ramchen, K. & Teague, V., 5 Jun 2012, Public Key Cryptography, PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 431-448 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7293 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access